applied cryptography - protocols, algorithms, and source code in c

389404 930 x lai and j massey hash functions based on

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Multistage Knapsack Public–Key Cryptosystem,” International Journal of Systems Science, v. 22, n. 11, Nov 1991, pp. 2313–2320. 748. T. Hwang, “Attacks on Okamoto and Tanaka’s One–Way ID–Based Key Distribution System,” Information Processing Letters, v. 43, n. 2, Aug 1992, pp. 83–86. 749. T. Hwang and T.R.N. Rao, “Secret Error–Correcting Codes (SECC),” Advances in Cryptology—CRYPTO ’88 Proceedings, Springer–Verlag, 1990, pp. 540–563. 750. C. I’Anson and C. Mitchell, “Security Defects in CCITT Recommendation X.509—the Directory Authentication Framework,” Computer Communications Review, v. 20, n. 2, Apr 1990, pp. 30–34. 751. IBM, “Common Cryptographic Architecture: Cryptographic Application Programming Interface Reference,” SC40–1675–1, IBM Corp., Nov 1990. 752. IBM, “Common Cryptographic Architecture: Cryptographic Application Programming Interface Reference—Public Key Algorithm,” IBM Corp., Mar 1993. 753. R. Impagliazzo and M. Yung, “Direct Minimum–Knowledge Computations,” Advances in Cryptology—CRYPTO ’87 Proceedings, Springer–Verlag, 1988, pp. 40–51. 754. I. Ingemarsson, “A New Algorithm for the Solution of the Knapsack Problem,” Lecture Notes in Computer Science 149; Cryptography: Proceedings of the Workshop on Cryptography, Springer–Verlag, 1983, pp. 309–315. 755. I. Ingemarsson, “Delay Estimation for Truly Random Binary Sequences or How to Measure the Length of Rip van Winkle’s Sleep,” Communications and Cryptography: Two Sides of One Tapestry, R.E. Blahut et al., eds., Kluwer Adademic Publishers, 1994, pp. 179–186. 756. I. Ingemarsson and G.J. Simmons, “A Protocol to Set Up Shared Secret Schemes without the Assistance of a Mutually Trusted Party,” Advances in Cryptology—EUROCRYPT ’90 Proceedings, Springer–Verlag, 1991, pp. 266–282. 757. I. Ingemarsson, D.T. Tang, and C.K. Wong, “A Conference Key Distribution System,” IEEE Transactions on Information Theory, v. IT...
View Full Document

This note was uploaded on 10/18/2010 for the course MATH CS 301 taught by Professor Aliulger during the Fall '10 term at Koç University.

Ask a homework question - tutors are online